Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-4367 | GEN003460 | SV-45675r1_rule | Medium |
Description |
---|
If the owner of the at.allow file is not set to root, bin, or sys, unauthorized users could be allowed to view or edit sensitive information contained within the file. |
STIG | Date |
---|---|
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide | 2018-09-19 |
Check Text ( C-43041r1_chk ) |
---|
# ls -lL /etc/at.allow If the at.allow file is not owned by root, sys, or bin, this is a finding. |
Fix Text (F-39073r1_fix) |
---|
Change the owner of the at.allow file. # chown root /etc/at.allow |